SeLoadDriver Privilege
Last updated
Last updated
The last github has all the instructions.
Upload the driver eoploaddriver_x64.exe, Capcom.sys file, ExploitCapcom.exe on target machine under writable directory.
First we need to turn on the privilege of SeLoadDriverPrivilege that is disabled.
Now using ExploitCapcom.exe load Capcom.sys to target machine.
After successfully loading Capcom.sys we can now run any cmd as privilege user with EXPLOIT keyword.
Now we can generate a revshell with msfvenom. You can also use other revshell. On Attacker vm.
Upload it on Traget machine. Now execute the payload.
You gonna get reverse shell as SYSTEM.